123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149 |
- // Copyright 2016 The etcd Authors
- //
- // Licensed under the Apache License, Version 2.0 (the "License");
- // you may not use this file except in compliance with the License.
- // You may obtain a copy of the License at
- //
- // http://www.apache.org/licenses/LICENSE-2.0
- //
- // Unless required by applicable law or agreed to in writing, software
- // distributed under the License is distributed on an "AS IS" BASIS,
- // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- // See the License for the specific language governing permissions and
- // limitations under the License.
- package auth
- // CAUTION: This randum number based token mechanism is only for testing purpose.
- // JWT based mechanism will be added in the near future.
- import (
- "crypto/rand"
- "math/big"
- "strings"
- "sync"
- "time"
- )
- const (
- letters = "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ"
- defaultSimpleTokenLength = 16
- )
- // var for testing purposes
- var (
- simpleTokenTTL = 5 * time.Minute
- simpleTokenTTLResolution = 1 * time.Second
- )
- type simpleTokenTTLKeeper struct {
- tokens map[string]time.Time
- donec chan struct{}
- stopc chan struct{}
- deleteTokenFunc func(string)
- mu *sync.Mutex
- }
- func (tm *simpleTokenTTLKeeper) stop() {
- select {
- case tm.stopc <- struct{}{}:
- case <-tm.donec:
- }
- <-tm.donec
- }
- func (tm *simpleTokenTTLKeeper) addSimpleToken(token string) {
- tm.tokens[token] = time.Now().Add(simpleTokenTTL)
- }
- func (tm *simpleTokenTTLKeeper) resetSimpleToken(token string) {
- if _, ok := tm.tokens[token]; ok {
- tm.tokens[token] = time.Now().Add(simpleTokenTTL)
- }
- }
- func (tm *simpleTokenTTLKeeper) deleteSimpleToken(token string) {
- delete(tm.tokens, token)
- }
- func (tm *simpleTokenTTLKeeper) run() {
- tokenTicker := time.NewTicker(simpleTokenTTLResolution)
- defer func() {
- tokenTicker.Stop()
- close(tm.donec)
- }()
- for {
- select {
- case <-tokenTicker.C:
- nowtime := time.Now()
- tm.mu.Lock()
- for t, tokenendtime := range tm.tokens {
- if nowtime.After(tokenendtime) {
- tm.deleteTokenFunc(t)
- delete(tm.tokens, t)
- }
- }
- tm.mu.Unlock()
- case <-tm.stopc:
- return
- }
- }
- }
- func (as *authStore) enable() {
- delf := func(tk string) {
- if username, ok := as.simpleTokens[tk]; ok {
- plog.Infof("deleting token %s for user %s", tk, username)
- delete(as.simpleTokens, tk)
- }
- }
- as.simpleTokenKeeper = &simpleTokenTTLKeeper{
- tokens: make(map[string]time.Time),
- donec: make(chan struct{}),
- stopc: make(chan struct{}),
- deleteTokenFunc: delf,
- mu: &as.simpleTokensMu,
- }
- go as.simpleTokenKeeper.run()
- }
- func (as *authStore) GenSimpleToken() (string, error) {
- ret := make([]byte, defaultSimpleTokenLength)
- for i := 0; i < defaultSimpleTokenLength; i++ {
- bInt, err := rand.Int(rand.Reader, big.NewInt(int64(len(letters))))
- if err != nil {
- return "", err
- }
- ret[i] = letters[bInt.Int64()]
- }
- return string(ret), nil
- }
- func (as *authStore) assignSimpleTokenToUser(username, token string) {
- as.simpleTokensMu.Lock()
- _, ok := as.simpleTokens[token]
- if ok {
- plog.Panicf("token %s is alredy used", token)
- }
- as.simpleTokens[token] = username
- as.simpleTokenKeeper.addSimpleToken(token)
- as.simpleTokensMu.Unlock()
- }
- func (as *authStore) invalidateUser(username string) {
- if as.simpleTokenKeeper == nil {
- return
- }
- as.simpleTokensMu.Lock()
- for token, name := range as.simpleTokens {
- if strings.Compare(name, username) == 0 {
- delete(as.simpleTokens, token)
- as.simpleTokenKeeper.deleteSimpleToken(token)
- }
- }
- as.simpleTokensMu.Unlock()
- }
|